mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2026-05-09 22:37:49 +08:00
upload img md rb file
This commit is contained in:
Binary file not shown.
|
After Width: | Height: | Size: 50 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 32 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 32 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 82 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 75 KiB |
File diff suppressed because one or more lines are too long
@@ -2,14 +2,20 @@
|
|||||||
### CVE-2017-7269 远程代码执行回显验证
|
### CVE-2017-7269 远程代码执行回显验证
|
||||||
|
|
||||||
---
|
---
|
||||||
我们团队对此次 CVE-2017-7269 漏洞的分析报告: https://ht-sec.org/cve-2017-7269-vulnerabilities/
|
我们团队对此次 CVE-2017-7269(IIS6-0远程命令执行漏洞) 漏洞的分析报告: https://ht-sec.org/cve-2017-7269-vulnerabilities/
|
||||||
|
|
||||||
默认PoC 只能弹`calc.exe` ,现在修改成可以响应请求,命令格式为:<br/>
|
默认PoC 只能弹`calc.exe` ,现在修改成可以响应请求,命令格式为:<br/>
|
||||||
|
|
||||||
CVE-2017-7269_remote_echo.py ip_address port
|
`CVE-2017-7269_remote_echo.py ip_address port`
|
||||||
|
|
||||||
<br/>
|
<br/>
|
||||||
|
|
||||||
|
### 利用条件
|
||||||
|
|
||||||
|
- iis6.0
|
||||||
|
- 开启WebDav功能(具体为PROPFIND方法,成功则返回207或者200)
|
||||||
|
- windows server 2003 R2
|
||||||
|
|
||||||
效果如下:<br/>
|
效果如下:<br/>
|
||||||
|
|
||||||

|

|
||||||
|
|||||||
File diff suppressed because one or more lines are too long
Reference in New Issue
Block a user